Deck 30: Computer Safety and Ethics

Full screen (f)
exit full mode
Question
Surge protectors help protect computers from ____.

A) hackers
B) sniffers
C) power spikes
D) hard disk crashes
Use Space or
up arrow
down arrow
to flip the card.
Question
Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.
Question
A software firewall is more secure and easier to monitor than a hardware firewall.
Question
It is the responsibility of a company or individual to protect their data.
Question
A(n) public key deciphers the encrypted information in a transmission.
Question
When communicating on a forum, blog, or social network or other similar Internet-related sites, use a(n) alias to protect your privacy.
Question
Computer phishing involves invading someone else's computer, usually for personal gain or the satisfaction of a security system.
Question
Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.
Question
One easy way to avoid data loss is to ____.

A) plug the computer into a grounded outlet
B) save frequently
C) install a firewall
D) turn on some form of encryption
Question
It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.

A) hacking
B) encryption
C) spying
D) eavesdropping
Question
Sniffer attacks use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Question
Some spyware disguises itself as antispyware to gain access to your system.
Question
Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.
Question
If a network is large, a software firewall that controls the computers from one point should be implemented.
Question
Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.
Question
Using a notebook computer introduces risks not associated with desktop computers.
Question
What can result from making too many of the same motions over a long period of time?

A) Browser hijacking
B) Brute force attacks
C) Repetitive strain injury
D) Relaxed eye muscles
Question
What action might obstruct the air vents in your notebook computer and cause it to overheat?

A) Leaving it in the same position on the desk for too long
B) Using a cooling pad
C) Setting it directly on your lap
D) Plugging it into a grounded outlet
Question
If you work for a company that provides e-mail services, the information that you send is your property.
Question
Firewalls help prevent employees from tampering with or deleting data.
Question
The goal of ____ is to collect information about the user, the user's browsing habits, and other personal information.

A) a sniffer
B) worms
C) a virus
D) spyware
Question
TSL and SSL technology enables ____.

A) data to be backed up securely
B) companies to monitor unauthorized computer activity
C) system administrators to restrict access to files
D) sensitive information to be encrypted
Question
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?

A) Her Internet access could be slower
B) She could be charged additional costs
C) She could be held responsible for any illegal activity
D) Any of the above
Question
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. What is the first step Molly should take when setting up her wireless network?

A) Download eavesdropping software
B) Change the default password
C) Turn off the default encryption
D) Configure a hardware firewall
Question
FIGURE 30-1 <strong>FIGURE 30-1   The message in Figure 30-1 above shows an example of ____.</strong> A) hacking B) phishing C) sniffing D) browser hijacking <div style=padding-top: 35px> The message in Figure 30-1 above shows an example of ____.

A) hacking
B) phishing
C) sniffing
D) browser hijacking
Question
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?

A) Expensive
B) Light-weight
C) Ergonomic
D) Soft
Question
A(n) ____________________ is a program that hackers use to capture IDs and passwords on a network.
Question
Which of the following would be considered the strongest password?

A) JeR3My
B) tHund3r$t0rM
C) SouTHWeST!
D) #1fusion
Question
External hard drives can be used to help ____.

A) prevent computer hacking
B) avoid data loss
C) safeguard against software threats
D) protect your system against spyware
Question
If non-copyrighted information is published on a Web site, ____.

A) it is true
B) it cannot be copied and used as your own
C) it is false
D) the author is relieved of any responsibility
Question
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What can Nelson do to help avoid or minimize eyestrain?

A) Use a low-resolution monitor to increase visibility
B) Stay in the same position so his eyes become more comfortable
C) Avoid using extra lighting so the monitor is more easily visible
D) Take regular breaks to allow the eye muscles to relax
Question
Any information stored on a computer in an educational facility is the property of the ____.

A) person using the computer
B) school
C) person who created the information
D) none of the above
Question
When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations?

A) When you use a secure site
B) Only if you don't have a firewall
C) When the data is encrypted
D) Any time
Question
To make sure your e-commerce transactions are secure and to protect your private information, you should ____.

A) use a secure browser
B) check privacy policies
C) keep personal information private
D) all of the above
Question
Which of the following is not true about spyware?

A) It tracks your Web habits
B) It can take over control of your computer
C) It has redeeming qualities
D) It can direct you to Web sites you have not chosen to visit
Question
Often, you can inadvertently run a virus program by ____.

A) installing a security update
B) backing up data
C) opening an e-mail message or attachment
D) using a surge protector
Question
What is another term for brute force attacks?

A) Browser hijacking
B) Spyware attacks
C) Keylogger attacks
D) Dictionary attacks
Question
When you use a computer in a public place, you should ____.

A) verify that you have logged off
B) install antivirus software
C) use cookies to track your computer use
D) use a code name
Question
FIGURE 30-2 <strong>FIGURE 30-2   You could use the program shown in Figure 30-2 above to ____.</strong> A) protect your system against spyware B) back up files C) configure a hardware firewall D) password protect your wireless network <div style=padding-top: 35px> You could use the program shown in Figure 30-2 above to ____.

A) protect your system against spyware
B) back up files
C) configure a hardware firewall
D) password protect your wireless network
Question
What should you do before donating a computer?

A) Remove the antivirus software
B) Password-protect the operating system
C) Delete data from the hard drive
D) Turn off any encryption technologies
Question
A(n) ____________________ is a malicious program that records keystrokes.
Question
Match between columns
Where could you back up data?
FBI site
Where could you back up data?
Backup and Restore Center window
Where could you back up data?
VeriSign site
Where could you back up data?
Occupational Safety and Health Administration site
Where could you back up data?
Federal Trade Commission site
Where could you find resources for Internet safety?
FBI site
Where could you find resources for Internet safety?
Backup and Restore Center window
Where could you find resources for Internet safety?
VeriSign site
Where could you find resources for Internet safety?
Occupational Safety and Health Administration site
Where could you find resources for Internet safety?
Federal Trade Commission site
Where could you purchase an SSL certificate?
FBI site
Where could you purchase an SSL certificate?
Backup and Restore Center window
Where could you purchase an SSL certificate?
VeriSign site
Where could you purchase an SSL certificate?
Occupational Safety and Health Administration site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Where could you find guidelines to make sure your e-commerce transactions are secure?
FBI site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Backup and Restore Center window
Where could you find guidelines to make sure your e-commerce transactions are secure?
VeriSign site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Occupational Safety and Health Administration site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Federal Trade Commission site
Where would you find guidelines for using and purchasing computer equipment?
FBI site
Where would you find guidelines for using and purchasing computer equipment?
Backup and Restore Center window
Where would you find guidelines for using and purchasing computer equipment?
VeriSign site
Where would you find guidelines for using and purchasing computer equipment?
Occupational Safety and Health Administration site
Where would you find guidelines for using and purchasing computer equipment?
Federal Trade Commission site
Question
Why are passwords important? How do you maintain passwords and keep them secure? How do you create a strong password?
Question
____________________ are small files that are created when you visit a Web site and are stored on your computer, then accessed again the next time you visit the same site.
Question
A(n) ____________________ encrypts the information in a data transmission.
Question
Hackers often use spyware to control your browser, a practice called ____________________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 30: Computer Safety and Ethics
1
Surge protectors help protect computers from ____.

A) hackers
B) sniffers
C) power spikes
D) hard disk crashes
C
2
Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.
True
3
A software firewall is more secure and easier to monitor than a hardware firewall.
False
4
It is the responsibility of a company or individual to protect their data.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) public key deciphers the encrypted information in a transmission.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
When communicating on a forum, blog, or social network or other similar Internet-related sites, use a(n) alias to protect your privacy.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
Computer phishing involves invading someone else's computer, usually for personal gain or the satisfaction of a security system.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
One easy way to avoid data loss is to ____.

A) plug the computer into a grounded outlet
B) save frequently
C) install a firewall
D) turn on some form of encryption
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.

A) hacking
B) encryption
C) spying
D) eavesdropping
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
Sniffer attacks use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Some spyware disguises itself as antispyware to gain access to your system.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
If a network is large, a software firewall that controls the computers from one point should be implemented.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
Using a notebook computer introduces risks not associated with desktop computers.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
What can result from making too many of the same motions over a long period of time?

A) Browser hijacking
B) Brute force attacks
C) Repetitive strain injury
D) Relaxed eye muscles
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
What action might obstruct the air vents in your notebook computer and cause it to overheat?

A) Leaving it in the same position on the desk for too long
B) Using a cooling pad
C) Setting it directly on your lap
D) Plugging it into a grounded outlet
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
If you work for a company that provides e-mail services, the information that you send is your property.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
Firewalls help prevent employees from tampering with or deleting data.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
The goal of ____ is to collect information about the user, the user's browsing habits, and other personal information.

A) a sniffer
B) worms
C) a virus
D) spyware
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
TSL and SSL technology enables ____.

A) data to be backed up securely
B) companies to monitor unauthorized computer activity
C) system administrators to restrict access to files
D) sensitive information to be encrypted
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?

A) Her Internet access could be slower
B) She could be charged additional costs
C) She could be held responsible for any illegal activity
D) Any of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. What is the first step Molly should take when setting up her wireless network?

A) Download eavesdropping software
B) Change the default password
C) Turn off the default encryption
D) Configure a hardware firewall
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
FIGURE 30-1 <strong>FIGURE 30-1   The message in Figure 30-1 above shows an example of ____.</strong> A) hacking B) phishing C) sniffing D) browser hijacking The message in Figure 30-1 above shows an example of ____.

A) hacking
B) phishing
C) sniffing
D) browser hijacking
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?

A) Expensive
B) Light-weight
C) Ergonomic
D) Soft
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ is a program that hackers use to capture IDs and passwords on a network.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following would be considered the strongest password?

A) JeR3My
B) tHund3r$t0rM
C) SouTHWeST!
D) #1fusion
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
External hard drives can be used to help ____.

A) prevent computer hacking
B) avoid data loss
C) safeguard against software threats
D) protect your system against spyware
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
If non-copyrighted information is published on a Web site, ____.

A) it is true
B) it cannot be copied and used as your own
C) it is false
D) the author is relieved of any responsibility
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What can Nelson do to help avoid or minimize eyestrain?

A) Use a low-resolution monitor to increase visibility
B) Stay in the same position so his eyes become more comfortable
C) Avoid using extra lighting so the monitor is more easily visible
D) Take regular breaks to allow the eye muscles to relax
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Any information stored on a computer in an educational facility is the property of the ____.

A) person using the computer
B) school
C) person who created the information
D) none of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations?

A) When you use a secure site
B) Only if you don't have a firewall
C) When the data is encrypted
D) Any time
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
To make sure your e-commerce transactions are secure and to protect your private information, you should ____.

A) use a secure browser
B) check privacy policies
C) keep personal information private
D) all of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is not true about spyware?

A) It tracks your Web habits
B) It can take over control of your computer
C) It has redeeming qualities
D) It can direct you to Web sites you have not chosen to visit
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Often, you can inadvertently run a virus program by ____.

A) installing a security update
B) backing up data
C) opening an e-mail message or attachment
D) using a surge protector
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
What is another term for brute force attacks?

A) Browser hijacking
B) Spyware attacks
C) Keylogger attacks
D) Dictionary attacks
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
When you use a computer in a public place, you should ____.

A) verify that you have logged off
B) install antivirus software
C) use cookies to track your computer use
D) use a code name
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
FIGURE 30-2 <strong>FIGURE 30-2   You could use the program shown in Figure 30-2 above to ____.</strong> A) protect your system against spyware B) back up files C) configure a hardware firewall D) password protect your wireless network You could use the program shown in Figure 30-2 above to ____.

A) protect your system against spyware
B) back up files
C) configure a hardware firewall
D) password protect your wireless network
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
What should you do before donating a computer?

A) Remove the antivirus software
B) Password-protect the operating system
C) Delete data from the hard drive
D) Turn off any encryption technologies
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
A(n) ____________________ is a malicious program that records keystrokes.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Where could you back up data?
FBI site
Where could you back up data?
Backup and Restore Center window
Where could you back up data?
VeriSign site
Where could you back up data?
Occupational Safety and Health Administration site
Where could you back up data?
Federal Trade Commission site
Where could you find resources for Internet safety?
FBI site
Where could you find resources for Internet safety?
Backup and Restore Center window
Where could you find resources for Internet safety?
VeriSign site
Where could you find resources for Internet safety?
Occupational Safety and Health Administration site
Where could you find resources for Internet safety?
Federal Trade Commission site
Where could you purchase an SSL certificate?
FBI site
Where could you purchase an SSL certificate?
Backup and Restore Center window
Where could you purchase an SSL certificate?
VeriSign site
Where could you purchase an SSL certificate?
Occupational Safety and Health Administration site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Where could you find guidelines to make sure your e-commerce transactions are secure?
FBI site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Backup and Restore Center window
Where could you find guidelines to make sure your e-commerce transactions are secure?
VeriSign site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Occupational Safety and Health Administration site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Federal Trade Commission site
Where would you find guidelines for using and purchasing computer equipment?
FBI site
Where would you find guidelines for using and purchasing computer equipment?
Backup and Restore Center window
Where would you find guidelines for using and purchasing computer equipment?
VeriSign site
Where would you find guidelines for using and purchasing computer equipment?
Occupational Safety and Health Administration site
Where would you find guidelines for using and purchasing computer equipment?
Federal Trade Commission site
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
Why are passwords important? How do you maintain passwords and keep them secure? How do you create a strong password?
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
____________________ are small files that are created when you visit a Web site and are stored on your computer, then accessed again the next time you visit the same site.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ____________________ encrypts the information in a data transmission.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
Hackers often use spyware to control your browser, a practice called ____________________.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.